Cost estimate on implementation of measures, ensuring information security in consumer cooperation organizations
Author(s): M.V. Biryukov, no, no, Belgorod University of Cooperation, Economics & Law, Belgorod, Russia, briu@ya.ruN.A. Klimova, no, no, Belgorod University of Cooperation, Economics & Law, Belgorod, Russia, natalya.zadorojnaia@yandex.ru
T.V. Gostishcheva, no, no, Belgorod University of Cooperation, Economics & Law, Belgorod, Russia, gtv432@mail.ru
Issue: Volume 47 № 1
Rubric: Public and business finance
Annotation: The purpose of this article is particularization of information security cost estimation systems` specification inconsumer cooperation organizations. At the present time the question of information security modernization is very actual: cybercrime rises annually, and the expense items, which aimed at maintaining of information security, are strictly regulated. The article contains review of cost estimates for information security inconsumer cooperation organizations. Also it includes calculation of expenses, which are necessary for information security modernization in a particular institution. The individual features of consumer cooperative organizations are analyzed. A selection of satisfactory organizations was made to assess the costs of upgrading a set of information protection tools. Proposed opportunities to redistribute the costs of modernization and increase the level of security in the medium term. During the study were used general scientific methods (observation, comparison);economic statistical data processing methods (grouping, comparison, business impact analysis (BIA)), cause and effect analysis, maintenance activities designed for ensuring reliability. The result of the study is an application of the proposed information security assessment algorithm, which applies in consumer cooperation organization, and an optimization the costs of information security tools` upgrading.
Keywords: information security, information security cost estimate, consumer cooperation organizations, integrated information security systems.
Full text (PDF): Download
Downloads count: 245